WO2023045962A1 - Système de chaîne de blocs légère anti-attaque parallèle - Google Patents

Système de chaîne de blocs légère anti-attaque parallèle Download PDF

Info

Publication number
WO2023045962A1
WO2023045962A1 PCT/CN2022/120162 CN2022120162W WO2023045962A1 WO 2023045962 A1 WO2023045962 A1 WO 2023045962A1 CN 2022120162 W CN2022120162 W CN 2022120162W WO 2023045962 A1 WO2023045962 A1 WO 2023045962A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
hash value
blockchain
parallel
business
Prior art date
Application number
PCT/CN2022/120162
Other languages
English (en)
Chinese (zh)
Inventor
杨邺
符爱花
Original Assignee
北京岸思信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京岸思信息科技有限公司 filed Critical 北京岸思信息科技有限公司
Publication of WO2023045962A1 publication Critical patent/WO2023045962A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Definitions

  • the invention relates to the technical field of block chains, in particular to a lightweight block chain system resistant to parallel attacks.
  • Blockchain (Blockchain) technology is a non-tamperable data storage technology.
  • Blockchain technology packs the data to be stored into blocks, and then connects each block one by one through a digital summary algorithm to form a chain structure, which is called a blockchain.
  • the blockchain also needs to set a system consensus mechanism to ensure that the blockchain cannot be tampered with.
  • the traditional blockchain technology adopts a distributed accounting model, which has many disadvantages such as large consumption of computing resources, complex consensus mechanism, and high operating costs.
  • the purpose of the present invention is to overcome the defects of the prior art, and propose a lightweight block chain system resistant to parallel attacks.
  • the present invention proposes a lightweight block chain system that is resistant to parallel attacks, and the system includes bookkeepers, supervisors and business servers; wherein,
  • the bookkeeper is used to generate and issue a new business block according to the business data sent by the business server;
  • the supervisor is used to verify the correctness of the newly released business block, accept the block and update the current state of the block chain after the verification is passed; it is also used to supervise the state of the entire block chain;
  • the business server is used to send the business data that needs to be uploaded to the bookkeeper, and is also used to interact with the supervisor to confirm whether the blockchain is in a normal state.
  • the block chain includes the 0th block and the business block incremented from 1 according to the block number.
  • the bookkeeper when the blockchain is established, the bookkeeper generates the bookkeeper public key and the bookkeeper private key according to the agreed digital signature algorithm, wherein the bookkeeper public key is included in the block, the bookkeeper’s private key is kept by the bookkeeper.
  • the business block includes a block header and a payload, wherein,
  • the block header includes the block number, the hash value of the block header of the previous block, the hash value of the load, n random values, n anti-parallel hash values and other extended information, as well as the digital signature generated for the aforementioned information;
  • the payload is the service data sent by the service server.
  • the method for generating the block header specifically includes:
  • n random values As an improvement of the above system, the generation of n random values, and calculation of n anti-parallel Hash values; specifically include:
  • Step 601) Set the first random value as 1, and set the temporary Hash value as anti-parallel default data
  • Step 602) calculate new temporary Hash value by the temporary Hash value according to the agreed algorithm, judge whether the k test bits in the new temporary Hash value that calculates are equal to the agreed value, if it is judged as no, the first random value is automatically Add 1, go to step 602); if judged yes, go to step 603);
  • Step 603 use the old temporary Hash value as the first anti-parallel Hash value; set the initial value of the random value sequence number m to 2;
  • Step 604 Set the mth random value to 1, 2 ⁇ m ⁇ n+1;
  • Step 605) calculate new temporary Hash value by the temporary Hash value according to the agreed algorithm, judge whether the k check bits in the new temporary Hash value that calculates are equal to the agreed value, if judged as no, the mth random value is automatically Add 1, go to step 605); if judged yes, go to step 606);
  • Step 606 using the old temporary Hash value as the mth anti-parallel Hash value
  • Step 607) Add 1 to the random value serial number m, when m ⁇ n+1, go to step 604), otherwise go to step 608);
  • Step 608) Obtain n parallel-resistant Hash values.
  • the newly released business block is verified for correctness; specifically includes:
  • the supervisor checks whether the business block number, the hash value of the block header of the previous block and the hash value of the load are correct;
  • the state of the entire blockchain is supervised; specifically including:
  • the supervisor regularly or irregularly calculates the current state of the blockchain, and judges whether the calculated current state of the blockchain is consistent with the current state of the previously recorded blockchain. If yes, save the current state of the blockchain;
  • the supervisor regularly or irregularly starts from the first block to re-verify whether the load of each business block of the blockchain matches the Hash value of the load in the block header. If there is a mismatch, the blockchain is declared abnormal, and Keep relevant evidence.
  • the calculation of the current state of the block chain specifically includes:
  • the Hash value of the 0th block is used as the supervisory Hash value of the block;
  • the supervisory Hash value of each block is calculated in a recursive manner; among them, the supervisory hash value of the sth block
  • the Hash value is calculated based on the supervised Hash value of the s-1th block and the block header of the sth block;
  • the supervisory Hash value of the 0th block is used as the current state of the blockchain
  • the supervisory Hash value of the Sth block is used as the block The current state of the chain.
  • the present invention has the advantages of:
  • the present invention implements a lightweight and low-cost blockchain through a new architecture design of "one bookkeeping and multiple supervision", and uses a unique consensus mechanism with anti-parallel computing capabilities, so that only a very small amount of The computing resources and energy consumption can maintain the operation of the blockchain, which has the advantages of low cost and extremely fast deployment;
  • the bookkeeper of this blockchain system adopts a non-competitive proof-of-work mechanism (PoW).
  • PoW non-competitive proof-of-work mechanism
  • the supervisor verifies the workload of the bookkeeper, rather than the workload competition between the bookkeepers, so that It avoids the vicious competition of "computing power" of the traditional blockchain.
  • the bookkeeper's workload proof adopts an anti-parallel attack mechanism, which only allows one core of one processor to perform calculations, which can effectively resist computing clusters.
  • Parallel attack and quantum parallel attack ;
  • the supervisor of this blockchain system can easily discover any tampering of blockchain data by saving and iteratively calculating the current state of the blockchain, combined with the verification of the load Hash value, and can also be very convenient Handle unexpected situations such as bookkeeper downtime;
  • the blockchain system is a distributed system.
  • the blocks released by bookkeepers will be saved by various supervisors and business servers. When any data loss or error occurs in any party, the data can be easily restored.
  • Figure 1 is a schematic diagram of the composition of the lightweight block chain system resistant to parallel attacks of the present invention.
  • Embodiment 1 of the present invention provides a lightweight blockchain system that is resistant to parallel attacks.
  • the system consists of bookkeepers, supervisors and business servers. The three can communicate with each other. There is only one bookkeeper, and there can be several supervisors and business servers.
  • Bookkeeper used to generate and publish new business blocks according to the business data sent by the business server
  • the supervisor is used to verify the correctness of the newly released business block, accept the block and update the current state of the block chain after the verification is passed; it is also used to supervise the state of the entire block chain;
  • the business server is used to send the business data that needs to be uploaded to the bookkeeper, and is also used to interact with the supervisor to confirm whether the blockchain is in a normal state.
  • the bookkeeper When the blockchain is established, the bookkeeper generates a set of public-private key pairs according to the agreed digital signature algorithm, which are called the public key of the bookkeeper and the private key of the bookkeeper.
  • the bookkeeper publishes the 0th block, and the 0th block contains at least the public key of the bookkeeper.
  • the bookkeeper's private key is kept secret by the bookkeeper and must not be disclosed.
  • Block 0 is the starting point of the blockchain, and subsequent blocks are called business blocks.
  • a business block consists of a block header and a payload.
  • the load is the data that the business server wants to upload to the blockchain (referred to as: on-chain data).
  • the block header contains the following content: block number, hash value of the block header of the previous block, hash value of load, n random values, n anti-parallel hash values and other extended information, as well as digital signatures for the aforementioned information.
  • other extended information includes some known information such as generation time and current state of the blockchain.
  • the block number of the previous block + 1 is used as the block number of this block (if the previous block is the 0th block, the block number of this block is 1).
  • the supervisor is a role that supervises the correctness of the state of the entire blockchain and newly generated blocks according to the bookkeeper's operating rules. Any person or institution can act as a watchdog.
  • the supervised Hash value of block 0 is Hash (block 0).
  • the supervised Hash value of the sth block (s>0) is Hash (the supervised Hash value of the s-1th block
  • the current state of the blockchain is the supervised Hash value of the latest block.
  • the supervisor For the newly generated blocks received, the supervisor at least performs the following verifications:
  • n random values and n anti-parallel Hash values correct; that is, are the k check bits in the new temporary Hash calculated by the above method equal to the agreed value? This part is calculated in the same way as when it was generated, and it is calculated by the supervisor.
  • the supervisor accepts the newly generated block and updates the current state of the blockchain.
  • the supervisor recalculates the current state of the blockchain from the 0th block on a regular or irregular basis. If the newly calculated current state of the blockchain is inconsistent with the current state of the previously recorded blockchain, the blockchain is declared abnormal and retained relevant evidence.
  • the supervisor regularly or irregularly starts from the first block to re-verify whether the load of each business block of the blockchain matches the Hash value of the load in the block header. If there is a mismatch, the block chain is declared abnormal, and relevant evidence is retained.
  • the business server sends the business data that needs to be uploaded to the bookkeeper.
  • the communication between the business server and the bookkeeper should adopt two-way confidentiality and two-way identity authentication mechanism.
  • the business server will also interact with the supervisor regularly or irregularly to confirm whether the blockchain is in a normal state.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un système de chaîne de blocs légère anti-attaque parallèle. Le système comprend un teneur de registre, des superviseurs et des serveurs de service, le teneur de registre étant utilisé pour générer, selon des données de service envoyées par les serveurs de service, un nouveau bloc de service, et publier celui-ci ; les superviseurs étant utilisés pour effectuer une vérification d'exactitude sur le bloc de service nouvellement publié, accepter le bloc après que la vérification a réussi, et mettre à jour l'état actuel d'une chaîne de blocs, et étant également utilisés pour surveiller l'état de la chaîne de blocs entière ; et les serveurs de service étant utilisés pour envoyer, au teneur de registre, les données de service qui nécessitent une mise en chaîne, et étant également utilisés pour interagir avec les superviseurs, de façon à confirmer si la chaîne de blocs est dans un état normal. Dans la présente invention, en utilisant une toute nouvelle conception architecturale à « un seul teneur de registre et de multiples superviseurs » et un mécanisme de consensus unique ayant une capacité anti-calcul parallèle, une chaîne de blocs légère et à faible coût est réalisée, de telle manière qu'une quantité de ressources informatiques et une consommation d'énergie extrêmement faibles soient nécessaires pour maintenir le fonctionnement de la chaîne de blocs ; et la présente invention présente les avantages d'un faible coût et d'un déploiement extrêmement rapide.
PCT/CN2022/120162 2021-09-26 2022-09-21 Système de chaîne de blocs légère anti-attaque parallèle WO2023045962A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111128792.7A CN113965326B (zh) 2021-09-26 2021-09-26 一种抗并行攻击的轻量化区块链***
CN202111128792.7 2021-09-26

Publications (1)

Publication Number Publication Date
WO2023045962A1 true WO2023045962A1 (fr) 2023-03-30

Family

ID=79462636

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/120162 WO2023045962A1 (fr) 2021-09-26 2022-09-21 Système de chaîne de blocs légère anti-attaque parallèle

Country Status (2)

Country Link
CN (1) CN113965326B (fr)
WO (1) WO2023045962A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965326B (zh) * 2021-09-26 2022-05-17 北京岸思信息科技有限公司 一种抗并行攻击的轻量化区块链***

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846752A (zh) * 2018-06-06 2018-11-20 北京京东金融科技控股有限公司 数据处理方法、***、区块链平台以及可读存储介质
CN110232634A (zh) * 2019-06-05 2019-09-13 湖南道业信息科技有限公司 区块链共识方法、区块链共识***和计算机可读存储介质
CN112073483A (zh) * 2020-08-28 2020-12-11 武汉大学 基于信誉与委员会背书机制的权威证明共识方法及***
CN113965326A (zh) * 2021-09-26 2022-01-21 北京岸思信息科技有限公司 一种抗并行攻击的轻量化区块链***

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110930149B (zh) * 2018-12-07 2023-09-26 深圳市智税链科技有限公司 在区块链网络中确定记账节点的方法、代理节点和介质
CN110489486B (zh) * 2019-08-02 2020-12-18 腾讯科技(深圳)有限公司 生成区块链网络的方法、种子节点和介质
CN110825755B (zh) * 2019-10-30 2021-05-04 北京海益同展信息科技有限公司 区块链的共识方法、共识节点、电子设备、存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846752A (zh) * 2018-06-06 2018-11-20 北京京东金融科技控股有限公司 数据处理方法、***、区块链平台以及可读存储介质
CN110232634A (zh) * 2019-06-05 2019-09-13 湖南道业信息科技有限公司 区块链共识方法、区块链共识***和计算机可读存储介质
CN112073483A (zh) * 2020-08-28 2020-12-11 武汉大学 基于信誉与委员会背书机制的权威证明共识方法及***
CN113965326A (zh) * 2021-09-26 2022-01-21 北京岸思信息科技有限公司 一种抗并行攻击的轻量化区块链***

Also Published As

Publication number Publication date
CN113965326B (zh) 2022-05-17
CN113965326A (zh) 2022-01-21

Similar Documents

Publication Publication Date Title
US10630463B2 (en) Meta block chain
KR102315473B1 (ko) 병렬-처리 블록체인 트랜잭션을 위한 시스템 및 방법
EP3580905B1 (fr) Réseau de chaîne de blocs de consortium avec protocoles de chaîne de blocs et de consensus vérifiés
US20230120742A1 (en) Quantumproof blockchain
Duong et al. Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake
US20200143366A1 (en) Methods for decentralized digital asset transfer and smart contract state transition
US20180309567A1 (en) Confidentiality in a consortium blockchain network
CN112583917B (zh) 一种基于cscp的混合链构建方法
US20180219669A1 (en) Blockchain hash value recomputation
CN112615915B (zh) 一种在私有链之间构建联盟链的方法
EP3769217B1 (fr) Classement par ordre priorité d'un stockage de données de chaîne de blocs partagées
CN111837117B (zh) 可信执行环境中基于纠错编码的共享区块链数据存储
US11637711B2 (en) Method and system for DLT networks consensus enhancement using quantum computing mechanisms
Yanovich et al. Exonum: Byzantine fault tolerant protocol for blockchains
WO2021258549A1 (fr) Procédés de signature et de vérification de signature adaptés à une ligne d'assemblage, dispositif, et support d'enregistrement
CN112507393A (zh) 一种保障区块链跨链事务一致性的方法
WO2023045962A1 (fr) Système de chaîne de blocs légère anti-attaque parallèle
US6826687B1 (en) Commitments in signatures
CN112417512A (zh) 一种基于区块链的跨境贸易隐私数据管理***及方法
US20230006836A1 (en) Multi-party and multi-use quantum resistant signatures and key establishment
Khalifa et al. Quantum attacks and defenses for proof-of-stake
CN112202703A (zh) 基于冗余余数***的区块链存储优化方法
Cheng et al. A new hybrid consensus protocol: Deterministic proof of work
Wang et al. Strongly synchronized redactable blockchain based on verifiable delay functions
Qi et al. Latency-first smart contract: Overclock the blockchain for a while

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22872008

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE